Description
Droppy versions <3.5.0 does not perform any verification for cross-domain websocket requests. An attacker is able to make a specially crafted page that can send requests as the context of the currently logged in user. For example this means the malicious user could add a new admin account under his control and delete others.
Remediation
References
https://nodesecurity.io/advisories/91
Related Vulnerabilities
CVE-2015-7501 Vulnerability in maven package org.apache.commons:commons-collections4
CVE-2014-9634 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-0436 Vulnerability in npm package grunt
CVE-2016-10618 Vulnerability in npm package node-browser
CVE-2017-18214 Vulnerability in maven package org.webjars.bower:moment